List of Tables

 

 

Table 39 LAN IP ...................................................................................................................................

121

Table 40 Advanced LAN Setup ............................................................................................................

121

Table 41 DHCP Setup .........................................................................................................................

123

Table 42 LAN Client List ......................................................................................................................

124

Table 43 LAN IP Alias ..........................................................................................................................

126

Table 44 Types of Encryption for Each Type of Authentication ...........................................................

129

Table 45 Wireless LAN: General .........................................................................................................

130

Table 46 Wireless No Security .............................................................................................................

132

Table 47 Wireless: Static WEP Encryption ..........................................................................................

133

Table 48 Wireless: WPA-PSK/WPA2-PSK ...........................................................................................

134

Table 49 Wireless: WPA/WPA2 ...........................................................................................................

136

Table 50 Wireless LAN: Advanced ......................................................................................................

137

Table 51 MAC Address Filter ...............................................................................................................

138

Table 52 Network > Wireless LAN > WPS ...........................................................................................

145

Table 53 Network > Wireless LAN > WPS Station ...............................................................................

146

Table 54 NAT Definitions .....................................................................................................................

147

Table 55 NAT Mapping Types ..............................................................................................................

149

Table 56 NAT General .........................................................................................................................

151

Table 57 Services and Port Numbers ..................................................................................................

152

Table 58 NAT Port Forwarding ............................................................................................................

154

Table 59 Port Forwarding Rule Setup ..................................................................................................

155

Table 60 Common IP Ports ..................................................................................................................

161

Table 61 ICMP Commands That Trigger Alerts ...................................................................................

164

Table 62 Legal NetBIOS Commands ...................................................................................................

164

Table 63 Legal SMTP Commands .......................................................................................................

164

Table 64 Firewall: General ...................................................................................................................

177

Table 65 Firewall Rules .......................................................................................................................

178

Table 66 Firewall: Edit Rule .................................................................................................................

180

Table 67 Customized Services ............................................................................................................

182

Table 68 Firewall: Configure Customized Services .............................................................................

183

Table 69 Predefined Services ..............................................................................................................

187

Table 70 Firewall: Anti Probing ............................................................................................................

190

Table 71 Firewall: Threshold ................................................................................................................

192

Table 72 Content Filter: Keyword ........................................................................................................

196

Table 73 Content Filter: Schedule .......................................................................................................

197

Table 74 Content Filter: Trusted ..........................................................................................................

198

Table 75 Static Route ...........................................................................................................................

202

Table 76 Static Route Edit ...................................................................................................................

203

Table 77 Application and Subnet-based Bandwidth Management Example .......................................

206

Table 78 Maximize Bandwidth Usage Example ...................................................................................

207

Table 79 Priority-based Allotment of Unused and Unbudgeted Bandwidth Example ..........................

208

Table 80 Fairness-based Allotment of Unused and Unbudgeted Bandwidth Example .......................

208

Table 81 Bandwidth Management Priorities ........................................................................................

209

28

P-660HW-Tx v3 User’s Guide